„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Verantwortlichkeit und Einsatz von Algorithmen bei öffentlichen Stellen
-
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
-
Forbidden (0,1)-Vectors in Hyperplanes of ℝ n : The Restricted Case
-
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones
-
Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals
-
The $$\mathrm {ACAC_{D}}$$ ACAC D model for mutable activity control and chain of dependencies in smart and connected systems
-
Rezensionen
-
Rezensionen
-
Dynamics of quantum mechanical schrodinger wave function and chaos for biomedical image encryption scheme
-
Enumeration of 2-(9, 3, λ) Designs and Their Resolutions
-
Multidisciplinary research and practice for informations systems – proceedings
-
Rezensionen
-
Rezensionen
-
Rezensionen
-
Manuelle Kryptografie – Mit über 150 Papier- und Bleistiftverfahren die Welt der Ver- und Entschlüsselung entdecken
-
Contemporary cryptology—The science of information integrity – edited by Gustavus J. Simmons, New York, IEEE Press, 1992, xv+640 pp. ISBN 0-87942-277-7, IEEE Order Number: PC0271-7
-
Ein Reifegradmodell für die Datenschutzorganisation
-
Interactive video retrieval in the age of effective joint embedding deep models: lessons from the 11th VBS
-
Near-factorizations of dihedral groups
-
Vectorial negabent concepts: similarities, differences, and generalizations